# Getting Started

## Getting Started Guide

In this article, we provide you with the **first steps** you should follow to efficiently use **CYBERAWARE SECURITY** and its **tools.** This is essentially an introductory guidance that will enable you to establish the **foundation** needed **prior** to **testing** and **utilising** the functionalities of the platform.

&#x20;

**1.** As a first step, it is a must that a **whitelisting** of **our mail servers** is in place as long as you are using our **default SMTP servers.** This will ensure that emails within the scope of **student notifications** or [Email Campaigns](https://docs.cyberawaresecurity.com/admin-portal/email-campaigns) targeting your company will not be regarded as **spam/junk.** If your organisation is using **Microsoft 365,** please refer to our article called [Microsoft 365 Whitelist](https://docs.cyberawaresecurity.com/tips-and-tricks/microsoft-365-whitelist). Otherwise, please have a look at our [Whitelist IPs and Domains](https://docs.cyberawaresecurity.com/tips-and-tricks/whitelist-ips-and-domains) article as it provides the appropriate **hostnames** and **IPs** for whitelisting.

&#x20;

**2.** As a next, you will have to add some [Authorised Domains](https://docs.cyberawaresecurity.com/admin-portal/authorised-domains) that you own and exist under your **DNS server.** If the configuration is successful and the platform recognises them as verified legitimate domains, it will allow you to initiate and perform training and email campaigns.

&#x20;

**3.** Now, it is time to enable the [Student Notifications](https://docs.cyberawaresecurity.com/admin-portal/student-notifications). This feature is responsible for sending out **certain email** formats to **recipients** when **specific events** are triggered. Such events can be the creation of their CYBERAWARE SECURITY accounts or their assignment to [Training Campaigns](https://docs.cyberawaresecurity.com/admin-portal/training-campaigns). As mentioned earlier, for the notifications you can always use your **own custom** [SMTP Profiles](https://docs.cyberawaresecurity.com/admin-portal/smtp-profiles) or just settle with the default one we provide.

&#x20;

**4.** Last but not least, to actually perform any sort of campaign and distribute the necessary **courses** or **emails,** you will need to add the intended targets. Anyone (**explicitly within** your organisation) can be a recipient, as long as they are required to enhance their **cybersecurity awareness** or be tested against their **phishing detection** skills. Click on this [link](https://docs.cyberawaresecurity.com/admin-portal/recipients) to learn further information regarding **recipients.**


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.cyberawaresecurity.com/admin-portal/getting-started.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
